A New Beginning for Decentralised Credentials

About ten days ago we received confirmation of the cancellation of the NHS Digital Staff Passport programme. The news were received with sadness and concern by many teams, local and central, dozens of colleagues who had been working for approximately 5 years on this initiative. There were calls to reflect on the learnings, and signals … Continue reading A New Beginning for Decentralised Credentials

Identity Data Model

Third part of the Series: "Identity Modalities and Personas" In previous articles I described how the tendency towards "point solutions" and narrow "use cases" block the solution to long-standing identity and access management problems in NHS England (and --in reality-- in most other institutions and organisations). It is evident that organisational and "cultural" factors have … Continue reading Identity Data Model

Modalities of Identity and ‘Personas’ (2)

The issues described in my previous article call for a comprehensive solution combining Enterprise and Solution Architecture, but also organisational changes at the level of IT and Architecture Governance. Any experienced professional I am sure will agree that the problems faced by Identity Management are not due to the lack of technical expertise, but to … Continue reading Modalities of Identity and ‘Personas’ (2)

Modalities of Identity and ‘Personas’ (1)

Introduction: A catalogue of User Journeys “putting the person first” in Identity Management strategy and solutions- Updates on the NHS England Technology Forum and Lab Over a year has passed since my last article here, a delay due to wide-ranging organisational changes and relative uncertainty in the NHS and its context. As a consequence of … Continue reading Modalities of Identity and ‘Personas’ (1)

Enterprise Architecture and Identity Management

In the context of a very productive discussion with NHS England colleagues, I keep looking for good references and ideas to support Enterprise Architecture governance. The basic framework is clear, considering we have great materials to guide us like the TOGAF standard; but as we progress in the conversation, it becomes increasingly clear that some … Continue reading Enterprise Architecture and Identity Management

The “Primary” Identity Management Taxonomy

Here is another small but hopefully relevant contribution to the Information Security and Identity Management professions. This time I present a root taxonomy, a set of definitions supporting our thinking. Here I suggest that, instead of using arbitrary "classifications" based on technologies. brands and marketing, we rely on clear categories arising from what we actually … Continue reading The “Primary” Identity Management Taxonomy

Reading “Identity and Capitalism” by Marie Moran (2) (v.02)

This is the second and final part of my comments after reading Marie Moran’s book “Identity and Capitalism” (2015). (v.2 small typos corrected) Before continuing it is necessary to emphasise that, precisely because the notion of Identity is contingent and historical, and because it has specific new content since the second half of the past … Continue reading Reading “Identity and Capitalism” by Marie Moran (2) (v.02)

Reading “Identity and Capitalism” by Marie Moran (1)

This book by Marie Moran (SAGE Publications, 2015), is a notable contribution to the study of "identity" under capitalism, but also a great foundation to consider how the economic, social and political contexts have been determining the business and technical aspects of "Identity Management." Marie Moran, a lecturer at the UCD School of Social Justice, … Continue reading Reading “Identity and Capitalism” by Marie Moran (1)

Microeconomics of I&AM: Identity Management in three slides

If I were asked to summarise my views on Identity and Access Management --what it is and what it will be-- I would first point to the complexity involved in delivering I&AM programmes. This complexity is rooted in the normal (conventional) operations of business management of the IT support functions. Given that IT is largely … Continue reading Microeconomics of I&AM: Identity Management in three slides